Solved

Peer to Peer File Sharing in Windows 7

Posted on 2015-02-09
5
106 Views
Last Modified: 2015-02-09
Have a small 2 computer office where we need to share a Microsoft Access database residing on one PC.

Does someone know if there are good "How-To" instructions online in setting up a Peer to Peer File Sharing in Windows 7?
0
Comment
Question by:clock1
  • 3
  • 2
5 Comments
 
LVL 25

Expert Comment

by:Fred Marshall
ID: 40598980
0
 

Author Comment

by:clock1
ID: 40599037
Fred - looking for step-by-step instructions.  Thanks
0
 
LVL 25

Accepted Solution

by:
Fred Marshall earned 500 total points
ID: 40599208
The step-by-step instructions will depend on your objectives.  The paper that I referenced starts out by saying:
A common practice in small networks is making file sharing easy which works extremely well when intra-network security is not an issue. In essence, everyone, that is "Everyone", is given access to all of the shared files - often the entire C: drive on every computer in the network
. Then, the paper goes on to describe the approach to be used if there needs to be some intra-network security.  

In view of your problem statement, I presume that intra-network security is not going to be an issue.  If so, then here is what you do:  (Here, I will refer to the computer with the Access database file as the "file server" or just "server" and the other computer as the "client").

1) Choose a file folder on the server that includes the Access database file.  Preferably, this is not going to be the C: drive itself because that just introduces other issues.
2) Open the Windows Explorer so you can see the server computer's file folders.  
3) Right click on the folder you've chosen above.  Right hover over "Share with" and select "Specific people"
4) This will open a dialog called File Sharing.
 
In the Name list, you want to have "Everyone" and I'll assume that it's not there.
5) Type Everyone in the blank space above the list and click on "Add"
6) Once Everyone is on the list, then pull down Permission Level and click on Read/Write.
7) Then click on Share at the bottom.
File Sharing8) Right click on the same folder again and select Properties at the bottom of the list.
9) A Properties dialog will open.... Select the Security tab.
 
10) Highlight Everyone in the upper list.
11) Click on Edit just below the list on the right.
12) Check the box "Full Control" then OK and OK.

13) Right click on the same folder again and select Properties and the Sharing tab.
14) In the Sharing dialog, select Advanced Sharing
15) In the Advanced Sharing dialog, check the box" Share this Folder"

16) Near the bottom of the dialog, click on Permissions
17) If Everyone isn't on the list, add it.
18) Once again, make sure that Full Control is checked.
19) Click, OK and OK and Close.

Now on the client computer you should be able to see under "Network", this folder within the server computer.
0
 

Author Comment

by:clock1
ID: 40599342
How is that diff than HomeGroup.  Could HG solve my question
0
 
LVL 25

Expert Comment

by:Fred Marshall
ID: 40599419
It's different because it specifically doesn't use HG.

Perhaps using a HG would address your needs - but I avoid HomeGroup like the plague.  It introduces things that I'd rather not have to deal with as I don't find them necessary in the broader context of networking and have found them disruptive.  I'm sure it has features that some may find appealing but I rather hate to "fix" a network because it HG was introduced.

"Better is the enemy of good enough"
0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Nslookup is a command line driven utility supplied as part of most Windows operating systems that can reveal information related to domain names and the Internet Protocol (IP) addresses associated with them. In simple terms, it is a tool that can …
Sometimes you might need to configure routing based not only on destination IP address, but also on a combination of destination IP address (or hostname) and destination port number. I will describe a method how to accomplish this with free tools. …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.

778 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question